Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials

被引:0
|
作者
Derler, David [1 ]
Hanser, Christian [1 ]
Slamanig, Daniel [1 ]
机构
[1] Graz Univ Technol TUG, Inst Appl Informat Proc & Commun IAIK, A-8010 Graz, Austria
关键词
Proxy signatures; anonymous credentials; cryptographic protocols; privacy; provable security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy signatures enable an originator to delegate the signing rights for a restricted set of messages to a proxy. The proxy is then able to produce valid signatures only for messages from this delegated set on behalf of the originator. Recently, two variants of privacy-enhancing proxy signatures, namely blank signatures [25] and warrant-hiding proxy signatures [26], have been introduced. In this context, privacy-enhancing means that a verifier of a proxy signature does not learn anything about the delegated message set beyond the message being presented for verification. We observe that this principle bears similarities with functionality provided by anonymous credentials. Inspired by this observation, we examine black-box constructions of the two aforementioned proxy signatures from non-interactive anonymous credentials, i.e., anonymous credentials with a non-interactive showing protocol, and show that the so obtained proxy signatures are secure if the anonymous credential system is secure. Moreover, we present two concrete instantiations using well-known representatives of anonymous credentials, namely Camenisch-Lysyanskaya (CL) and Brands' credentials. While constructions of anonymous credentials from signature schemes with particular properties, such as CL signatures or structure-preserving signatures, as well as from special variants of signature schemes, such as group signatures, sanitizable and indexed aggregate signatures, are known, this is the first paper that provides constructions of special variants of signature schemes, i.e., privacy-enhancing proxy signatures, from anonymous credentials.
引用
收藏
页码:49 / 65
页数:17
相关论文
共 50 条
  • [1] Non-Interactive Anonymous Router
    Shi, Elaine
    Wu, Ke
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT III, 2021, 12698 : 489 - 520
  • [2] Privacy-Enhancing Decentralized Anonymous Credential in Smart Grids
    Lin, Chao
    He, Debiao
    Zhang, Hongjie
    Shao, Lisong
    Huang, Xinyi
    [J]. COMPUTER STANDARDS & INTERFACES, 2021, 75
  • [3] Non-interactive Confirmer Signatures
    Chow, Sherman S. M.
    Haralambiev, Kristiyan
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 49 - +
  • [4] Efficient Non-interactive Anonymous Communication
    Eskeland, Sigurd
    Boudko, Svetlana
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP SEC 2023, 2024, 679 : 102 - 116
  • [5] Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs
    ChunMing Tang
    DingYi Pei
    XiaoFeng Wang
    ZhuoJun Liu
    [J]. Science in China Series F: Information Sciences, 2008, 51 : 128 - 144
  • [6] Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs
    TANG ChunMing~1+ PEI DingYi~(1
    2 State Key Laboratory of Information Security
    3 School of Mathematics and Computational Mathematics of Shenzhen University
    [J]. Science China(Information Sciences), 2008, (02) : 128 - 144
  • [7] Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs
    Tang ChunMing
    Pei DingYi
    Wang XiaoFeng
    Liu ZhuoJun
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2008, 51 (02): : 128 - 144
  • [8] Non-interactive Blind Signatures for Random Messages
    Hanzlik, Lucjan
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT V, 2023, 14008 : 722 - 752
  • [9] Non-interactive auction scheme with strong privacy
    Peng, K
    Boyd, C
    Dawson, E
    Viswanathan, K
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2002, 2002, 2587 : 407 - 420
  • [10] On Proving Equivalence Class Signatures Secure from Non-interactive Assumptions
    Bauer, Balthazar
    Fuchsbauer, Georg
    Regen, Fabian
    [J]. PUBLIC-KEY CRYPTOGRAPHY, PT I, PKC 2024, 2024, 14601 : 3 - 36